Homomorphic encryption security - a review (original) (raw)

Homomorphic Encryption: Theory and Applications

Book Chapter in the book entitled: Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN: 980-953-307-848-4, Sen, J. (Ed.), published by INTECH Publishers, Croatia, in July 2013, pp. 1- 31., 2013

The goal of this chapter is to present a survey of homomorphic encryption techniques and their applications. After a detailed discussion on the introduction and motivation of the chapter, we present some basic concepts of cryptography. The fundamental theories of homomorphic encryption are then discussed with suitable examples. The chapter then provides a survey of some of the classical homomorphic encryption schemes existing in the current literature. Various applications and salient properties of homomorphic encryption schemes are then discussed in detail. The chapter then introduces the most important and recent research direction in the filed - fully homomorphic encryption. A significant number of propositions on fully homomorphic encryption is then discussed. Finally, the chapter concludes by outlining some emerging research trends in this exciting field of cryptography.

A survey on Fully Homomorphic Encryption

Cloud computing is an ever-growing field in today's era.With the accumulation of data and the advancement of technology,a large amount of data is generated everyday.Storage, availability and security of the data form major concerns in the field of cloud computing.This paper focuses on homomorphic encryption, which is largely used for security of data in the cloud.Homomorphic encryption is defined as the technique of encryption in which specific operations can be carried out on the encrypted data.The data is stored on a remote server.The task here is operating on the encrypted data.There are two types of homomorphic encryption, Fully homomorphic encryption and patially homomorphic encryption.Fully homomorphic encryption allow arbitrary computation on the ciphertext in a ring, while the partially homomorphic encryption is the one in which addition or multiplication operations can be carried out on the normal ciphertext.Homomorphic encryption plays a vital role in cloud computing as the encrypted data of companies is stored in a public cloud, thus taking advantage of the cloud provider's services.Various algorithms and methods of homomorphic encryption that have been proposed are discussed in this paper.

The Effectiveness of Homomorphic Encryption in Protecting Data Privacy.

International Journal of Research Publication and Reviews, Vol 5, no 11, pp 3235-3256 , 2024

As the use of digital services grows, protecting the privacy and integrity of sensitive data, especially in fields like healthcare, finance, and secure surveying, has become a critical concern. Homomorphic encryption (HE) offers a solution by allowing computations to be performed on encrypted data without revealing the original information. This paper examines the principles of homomorphic encryption and its applications in privacy-preserving tasks, focusing on its use in cloud computing, healthcare, and cybersecurity. Various types of HE schemes, including Fully Homomorphic Encryption (FHE), Partially Homomorphic Encryption (PHE), and Somewhat Homomorphic Encryption (SHE), are reviewed to assess their performance, efficiency, and real-world use. The paper also discusses the challenges of implementing HE, such as computational overhead and key management. It suggests directions for future research to improve the scalability and usability of HE in real-time applications. Addressing these challenges will make homomorphic encryption an essential tool for secure, privacy-preserving data processing and sharing in modern digital systems

A Survey on Homomorphic Encryption in Cloud Computing

2014

Cloud Computing is the delivery of service rather than product. You can share information to the clients on the cloud. Cloud provider can be of service provider, data provider and platform provider. There is major and challenging issue of cloud like security. The advantage of cloud is reduced cost, easy maintenance and providing of resources. In this paper I have survey the approach of Homomorphic encryption in cloud. Homomorphic encryption is the technique through which we can apply the algebraic operation on ciphertext without converting it in plaintext. Homomorphic encryption is the method which performs operation on encrypted data which will provide result without decrypting that data. This method provides the same result as operation performs on row data. The scheme is said to be “fully Homomorphic’’ when we can perform (a sequence of operations) both addition and multiplication, whereas, it is “somewhat Homomorphic’’ if it supports a limited number of operations.

A Survey on Fully Homomorphic Encryption and Its Applications

SCITECH, 2022

Fully homomorphic encryption (FHE) has been considered as the "holy grail" of cryptography for its adaptability as a cryptographic primitive and wide range of potential applications. It opens the door to many new capabilities with the goal to solve the IT world's problems of security and trust. FHE is a new but quickly developing technology. FHE is a cryptographic primitive that allows one to compute arbitrary functions over encrypted data. Since 2009, when Craig Gentry showed that FHE can be realized in principle, there has been a lot of new discoveries and inventions in this particular field and substantial progress has been made in finding more practical and more efficient schemes, as well. Such schemes have numerous applications since it allows users to encrypt their private data locally but still outsource the computation of the encrypted data without risking exposing the actual data. The new schemes significantly reduce the computational cost of FHE and make practical deployment within reach. However, FHE is made possible with many new problems and assumptions that are not yet well studied.

The Next Frontier of Security: Homomorphic Encryption in Action

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2024

Encryption is essential in preventing unauthorized access to sensitive data in light of the growing concerns about data security in cloud computing. Homomorphic encryption promises to enable secure calculations on encrypted data without the need for decryption, particularly for cloud-based operations. To evaluate the effectiveness and applicability of several homomorphic encryption algorithms for safe cloud computing, we compare and contrast them in this research paper. Partially homomorphic encryption (PHE), somewhat homomorphic encryption (SHE), and fully homomorphic encryption (FHE) are the three basic homomorphic encryption subtypes that we examine. The implications of this study can aid cloud service providers and organizations in selecting the most appropriate homomorphic encryption scheme based on their specific security requirements and performance considerations. The research contributes to the ongoing efforts to enhance data privacy in cloud computing environments, opening new possibilities for secure data processing in an increasingly connected digital world. The exploration of homomorphic encryption schemes in this study opens new avenues for research and development in the field of cryptographic techniques. As technology continues to evolve, so too must our approaches to safeguarding data. This research serves as a catalyst for further innovations in homomorphic encryption algorithms, enabling even more efficient and robust methods for secure data processing in cloud environments and beyond. The insights derived from this research paper not only empower cloud service providers and organizations to make informed decisions about selecting the most appropriate homomorphic encryption scheme but also contribute to the broader mission of fortifying data privacy and security in cloud computing.

A Survey on Implementations of Homomorphic Encryption Schemes

With the increased need for data confidentiality in various applications of our daily life, homomorphic encryption (HE) has emerged as a promising cryptographic topic. HE enables to perform computations directly on encrypted data (ciphertexts) without decryption in advance. Since the results of calculations remain encrypted and can only be decrypted by the data owner, confidentiality is guaranteed and any third party can operate on ciphertexts without access to decrypted data (plaintexts). Applying a homomorphic cryptosystem in a real-world application depends on its resource efficiency. Several works compared different HE schemes and gave the stakes of this research field. However, the existing works either do not deal with recently proposed HE schemes (such as CKKS) or focus only on one type of HE. In this paper, we conduct an extensive comparison and evaluation of homomorphic cryptosystems’ performance based on their experimental results. The study covers all three families of HE...

Processing Encrypted Data Using Homomorphic Encryption

2017

Fully Homomorphic Encryption (FHE) was initially introduced as a concept shortly after the development of the RSA cryptosystem, by Rivest et al. [54]. Although long sought after, the first functional scheme was only proposed over thirty years later by Gentry [34, 35] in 2009. The same blueprint to construct FHE has been followed in all subsequent work. First a scheme is constructed which can evaluate arithmetic circuits of a limited depth, a so-called Somewhat Homomorphic Encryption (SHE) scheme. If the complexity of the circuits which the SHE scheme can evaluate is slightly more than the complexity of the decryption circuit for the SHE scheme, then (by placing a SHE encryption of the scheme’s private key inside the public key) one can bootstrap the SHE scheme into a FHE scheme. This bootstrapping operation is obtained by homomorphically evaluating the decryption circuit on input of the ciphertext to be bootstrapped and the encryption of the secret key.

Homomorphic encryption applied to secure storage and treatments of data in cloud

International Journal of Cloud Computing, 2016

With the emergence of cloud computing, the concept of security has become a major issue. Indeed, the key challenge is to ensure customers that the selected cloud provider may store and process the sensitive data confidentially. If this is a storage service, data can be encrypted before sending them to the cloud server; in this case, data confidentiality is assured. However, before performing treatments, these data must be decrypted. It is this step that can be considered a breach of confidentiality. Indeed, the fear of seeing sensitive data be processed in raw is a major obstacle in adopting cloud services. To overcome this obstacle and strengthen confidence in the cloud services, in this paper we propose the adoption of homomorphic encryption technique which allows to perform operations on encrypted data without knowing the key secret.

Secure Data in Cloud Computing Using Homomorphic Encryption

2015

The emergence of cloud computing and cyber-physical systems made of security in processing data a major challenge. In order to ensure privacy and confidentiality of the data being manipulated, the use of cryptography is widely used today. In 2009, C. Gentry proposed the first fully homomorphic cryptosystem, to perform calculations on data previously encrypted without having to decrypt. This progress has allowed the opening of many industrial and research perspectives. However, despite recent progress, many limitations remain today on the lack of performance of these systems and their strong memory requirements. In this paper we focus on cloud computing along with its various security and privacy issues, we describe the role of homomorphic encryption scheme for ensuring data privacy and compare its types based on different characteristics.